binary bomb help

This is a discussion on binary bomb help within the Tech Board forums, part of the Community Boards category; I am really stuck on phase 3. Since the 1st and fourth numbers (same for the 2nd & 5th and ...

binary bomb help

I am really stuck on phase 3. Since the 1st and fourth numbers (same for the 2nd & 5th and 3rd and 6th) should be the same numbers to
defuse the 1st bomb,
I confused as to where to begin looking to solve the 2nd bomb. I
assume that
This address
(gdb) print $ebp
$13 = (void *) 0xbf9cd4a8
has something to do with. But as to apply it I not sure. Any you
provide any insight as to what I need to do?

Until you can build a working general purpose reprogrammable computer out of basic components from radio shack, you are not fit to call yourself a programmer in my presence. This is cwhizard, signing off.

It's a challenge. One of my former professors gave the same challenge to me when I took his class (OP: where are you going to school?). The idea is this: You have a program which accepts some input. Give it the right input and it "defuses", give it the wrong input and it "explodes". The idea is to disassemble the program, look at the assembly, and determine what input to give it.

My professors "bombs" were semi-unique - there where 5-10 different bombs, distributed randomly among us - and when the bomb blew up, it reported back. (Though some of us knew how to disable that, but then again, we also were able to disassemble the bomb...) It's a foray into reverse engineering & x86 assembly.

Edit: actually, this line:

Code:

0x080488c0 <phase_3+26>: call 0x8048dac <read_six_numbers>

...appears in my old homework (Not exactly, but we had a read_six_numbers). Now I'm really curious as to where the OP goes to school, or if this is just some well known thing that professors do to try and make students sweat. :-) (It's a fun homework, btw.)